cyber puzzle

1234567
Across
  1. 4. This word maintain the accuracy and trustworthinessof data over its entire lifecycle
  2. 5. Deliberate actions intended to harm, damage, or disrupt a system, person, or organization.
  3. 7. Measures or systems designed to protect against threats, damage, or unauthorized access.
Down
  1. 1. This word ensures that information and resources are accessible to authorized users when needed.
  2. 2. This word ensures that sensitive information is only accessible to authorized individuals.
  3. 3. The state of being protected from danger, theft, or unauthorized use of resources.
  4. 6. A term used to describe anything related to computers, networks, or the internet.